This book explores fundamental principles for securing IT
systems and illustrates them with hands-on experiments that
may be carried out by the reader using accompanying
software. It details different countermeasures and their
implementation.

Unlimited, READ [EBOOK], Free Online, [READ PDF] Kindle

Descriptions
This book explores fundamental principles for securing IT systems and illustrates them with
hands-on experiments that may be carried out by the reader using accompanying software. It
details different countermeasures and their implementation.